0% found this document useful (0 votes)
15 views4 pages

Intro To Industrial Security Midterm

Uploaded by

jaiiirahx07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views4 pages

Intro To Industrial Security Midterm

Uploaded by

jaiiirahx07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

DOCUMENT AND

INFORMATION
SECURITY

1. DOCUMENT the security protection as


SECURITY provided;
-It involves the
Protection of Documents 5.DECLASSIFY
and classified papers from -The act of removing the security
Loss,access by unauthorized classification from classified
Persons,damage,theft and information or matter.
Compromise through
Disclosure. 6.RECLASSIFYING OR
REGARDING
2.CLASSIFIED -It refers to the act of changing
INFORMATION the assigned classification
-It includes all information from classified information or
Concerning document, matter.
Cryptographic devices
Developed projects and 7.UPGRADING
Materials following on -It refers to the act of assigning
The categories of the information or matter
Top secrets, confidential, to the higher classification that
Restricted,secret, that previously assigned to it.
Unclassified
8.COMPARTMENTATION
3.CLASSIFIED -It refers to the grant of access to
MATTER the classified matter only to
-It refers to any information properly cleared person when
Or material in any form or such classified information is
Of any nature, the required in the performance of
Safeguarding of which is their official duties
Necessary in the
Interest of security and 9.NEED TO KNOW
Which is classified for such -It is the dissemination of
Purpose by the responsible classified information or
Classifying authority. Matter to be limited strictly
To those person whose duties
4.CLASSIFY requires knowledge or
-This refers to the assigning of possession thereof.
Information or material, one of
The four security categories
After determination has been
Made that information requires
10.UNAUTHORIZED SOMETHING THAT COULD BE AN
-It refers to any person not INTELLIGENCE VALUE.
Authorized to have access -CONTAINS EXPLOITABLE
On classified matters INFORMATION REGARDLESS
OF ITS CONTENTS
11.COMPROMISE
-This take place through the -UNSCREENED MATERIALS OR
Loss of security which results DOCUMENTS SHOULD BE
From unauthorized persons CATEGORIZED AS CATEGORY C
Obtaining knowledge of
Classified matters. 4. CATEGORY D
● CURRENT RESIDENTIAL
TWO KIND OF DOCUMENTS ADDRESS
1. PERSONAL
2. OFFICIAL 1.TOP SECRET (GREEN COLOR
CODE)
CATEGORIES OF DOCUMENTS -It is any information and
1. CATEGORY A materials, the unauthorized
● INFORMATION WHICH disclosure of it would cause
CONTAINS REPORTABLE exceptionally grave damage to
TIME SENSITIVE, ORDER the nation, politically,
OF BATTLE AND economically and military
SIGNIFICANT INFORMATION operation
● IT SHOULD BE GIVEN
PRIORITY BECAUSE IT IS 2.SECRET (RED COLOR CODE)
CRITICAL INFORMATION -It is any information and material
● IT MUST BE FORWARDED the unauthorized disclosure of it
WITHOUT DELAY would endanger national security
● IT IS CRITICAL TO FRIENDLY causes serious injury to the
OPERATIONS interest and prestige of the
● IT REQUIRES IMMEDIATE ACTION nation of any government
activity
2.CATEGORY B
● ANYTHING THAT CONTAINS -It is any information or material
COMMUNICATION, the unauthorized disclosure of
CRYPTOGRAPHIC DOCUMENTS, OR it would be prejudicial to the
SYSTEM THAT SHOULD BE CLASSIFIED interest and prestige of the
AS SECRET AND REQUIRES national or governmental
SPECIAL HANDLING activity or would cause
● HIGHER AUTHORITIES SHOULD administrative embarrassment
DECLASSIFY IT or unwanted injury

3.CATEGORY C
● OTHER INFORMATION WHICH CONTAINS
4. RESTRICTED (WHITE OR NO COLOR) 3.EXCLUSION AREAS
-It is any information and material which -Used for handling and
Requires special protection other than storage of high cargo and
Those determines confidential, secrets classified documents;
And top secrets
-Area is under surveillance
Types of proprietary information
1.Trade secrets TYPES OF PROPRIETARY
-This consist of any formula, INFORMATION
Pattern,device or compilation 1.TRADE SECRETS
Of information which is used in one’s 2.PATENTS
Business and which gives him an -A grant made by the
Opportunity to gain an advantage government to an inventor
Versus competitors who do not conveying or securing to
Know or use it. Him the exclusive right to
Make, use, or sell his
It mat be formula for a compound, invention for term of years
A process of manufacturing, treating
Or preserving materials, a pattern for BADGE AND PASS
Machine or device, or a list of customers. CONTROL
-List of serial numbers
A trade secret is a process or device for -Mutilated
Continuous use in the protection of -Crosses indexed
The business -Lost
-Supervised
TYPES OF PERSONNEL IDENTIFICATION
● PERSONAL RECOGNITION VISITOR’S MOVEMENT
● ARTIFICIAL RECOGNITION CONTROL
1.Visitor’s logbook
2.Photograph
USE OF PASS SYSTEM 3.Escort
1.SINGLE PASS SYSTEM 4.Visitor’s entrance
2.PASS EXCHANGE SYSTEM 5.Time traveled
3.MULTIPLE PASS SYSTEM
PACKAGE MANAGEMENT
TYPES OF SENSITIVE AREA CONTROL
1.CONTROLLED AREAS 1.Package to be brought
-Areas which access is restricted inside and outside;
As to entrance or movement by all 2.Movement of visitors
Authorized personnel and vehicles. 3.Tags and marking

2.LIMITED AREAS
-Areas those within the controlled are
Where a greater degree of security is required
VEHICULAR MOVEMENT 11 General orders
CONTROL AND 1.To take charge of this post and all
IDENTIFICATION company properties in view and to
protect/preserve the same with utmost
1.Privately owned vehicle diligence.
Of personnel or visitor
Should be registered and 2.To walk in an alert manner during my
Are subjected to the tour of duty, keeping always on the
Identification and admittance alert and observing everything that
Procedure takes place within sight or hearing

2.Vehicles should be subjected 3.To report all violations of orders I am


For search at the entrance and instructed to enforce
Exit of the installation.
4.To relay all calls from posts more
3.All visitors with vehicle should distant from the guard house than my
Provide the security as to the own
Complete details of their duration of
Stay, person to be visited, and other 5.To quit my post only when properly
Information. relieved

4.All vehicles of visitors should be given 6.To receive obey, and pass on the guard
A sign or sticker to be placed on the who relieves me all orders from
Windshield. Company officers or officials,
Supervisors,post in charge or shift
5.Traffic warning signs should be installed leaders
In all entrance in order to guide the visitors
In their destination as well as to provide them 7.To talk to one except in line of duty.
With the necessary safety precautions while
They are inside the installation 8.To give the alarm in the case of fire
Or disorder
BUILDING ACCESS CONTROL 9.To call the superior officer in any case
1.Security system not covered by instructions.
2.Appropriate warning signs 10.To salute all company officials,
3.Parking areas superiors in the agency ranking
4.Entrance and exit public officials and officers of the
Philippine National Police
11.To be especially watchful at night and
During the time for challenging to
Challenge all persons on or near my
Post and to allow no one to pass or
Loiter without proper authority/

You might also like